ClamAV is an open source (GPL) antivirus engine designed for detecting trojans, viruses, malware and other malicious threats.
To Install ClamAV for Non-cPanel Servers
- 
Install EPEL Repo using the command:
rpm -Uvh https://dl.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpmThis will create an EPEL Repo file /etc/yum.repos.d/epel.repo.
 - 
Install required ClamAV packages.
yum install clamav clamd - 
Start the clamd service and set it to auto-start.
/etc/init.d/clamd onchkconfig clamd on
/etc/init.d/clamd start
 - 
Update ClamAV signatures using the command:
/usr/bin/freshclam 
Now, you can configure daily scan as given below:
- 
Create a cron file using the command
vim /etc/cron.daily/manual_clamscan - 
Add the following lines in the file /etc/cron.daily/manual_clamscan:
#!/bin/bash
SCAN_DIR=”/home”
LOG_FILE=”/var/log/clamav/manual_clamscan.log”
/usr/bin/clamscan -i -r $SCAN_DIR >> $LOG_FILENoteYou need to change SCAN_DIR to the directory that you want to scan.
 - 
Set executable permission for the cron script using the command:
chmod +x /etc/cron.daily/manual_clamscan 
To Install ClamAV for cPanel Servers
- 
Login to your WHM panel as the root user.
 - 
Click the cPanel icon.
 - 
Select Manage Plugins. This will bring up a list of additional cPanel modules.
 - 
Select the checkbox next to ClamAV Install and Keep Updated.
 - 
Submit the settings by clicking Save.
 
Listed below are some important options for Clamscan:
- 
-h, –help: Print help information and exit
 - 
-v, –verbose: Be verbose
 - 
-l FILE, –log=FILE: Save scan report to FILE
 - 
-f FILE, –file-list=FILE: Scan files listed line by line in FILE
 - 
-r, –recursive: Scan directories recursively. All the subdirectories in the given directory will be scanned. These options can be used multiple times.
 - 
-i: Print infected files
 - 
–remove[=yes/no(*)]: Remove infected files
 - 
–move=DIRECTORY: Move infected files into DIRECTORY. Directory must be writeable for the user or unprivileged user running clamscan.
 - 
–copy=DIRECTORY: Copy infected files into DIRECTORY. Directory must be writeable for the user or unprivileged user running clamscan.